Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 03:51
Static task
static1
Behavioral task
behavioral1
Sample
ec2f9735aea37282eea523010329322725fcb46bd7ac9acb645afdc2ac7e6631.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ec2f9735aea37282eea523010329322725fcb46bd7ac9acb645afdc2ac7e6631.dll
Resource
win10v2004-20220812-en
General
-
Target
ec2f9735aea37282eea523010329322725fcb46bd7ac9acb645afdc2ac7e6631.dll
-
Size
274KB
-
MD5
bcb9c54e49ecde50533e6f3c8edbaef2
-
SHA1
ff318d96b72846667e41bf76d03c566d894b0836
-
SHA256
ec2f9735aea37282eea523010329322725fcb46bd7ac9acb645afdc2ac7e6631
-
SHA512
fc00fd1f9f99ea872ca700bb1b0d5e9c43574aa00aa9b73e301a66784417928da0887d3aabfc6c201cf306baa3264a1aec278c5b091a43e41402ef67ee7a9a90
-
SSDEEP
6144:83wCNXbCIF4l93ymOxb0UGsjkLqnbm8pT:83w6jWbcF1GCli8pT
Malware Config
Signatures
-
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70504721c603d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376472680" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ce45addfdc11f74aa0a5d86f58d5b88a0000000002000000000010660000000100002000000013fa24ccc6363a8b07d5bab8420bcf47155de0c7ed06c84edf107604e2cbe50d000000000e8000000002000020000000a9d889880f345b3b127822bdaf44ecf688e4104403ce9b8c148f58db27f25b1b20000000983e9b71cd06222963752302780da9d4a5fcfd16a658dcee00a15a81603f56e6400000002851d3f6420f84af2946e3cbe47c290cd267ecbd14d8b1fdc6df271aec70db7398f204bb1a2e4e519df4bfa8a72c7c8038123b9ae8d4b38b3f820eff3787e0a7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{450E9D61-6FB9-11ED-85E0-FE41811C61F5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 884 rundll32.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 1820 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 884 rundll32.exe 884 rundll32.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe 960 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1604 ctfmon.exe 1604 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1564 iexplore.exe 1564 iexplore.exe 1196 IEXPLORE.EXE 1196 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 816 wrote to memory of 884 816 rundll32.exe 27 PID 816 wrote to memory of 884 816 rundll32.exe 27 PID 816 wrote to memory of 884 816 rundll32.exe 27 PID 816 wrote to memory of 884 816 rundll32.exe 27 PID 816 wrote to memory of 884 816 rundll32.exe 27 PID 816 wrote to memory of 884 816 rundll32.exe 27 PID 816 wrote to memory of 884 816 rundll32.exe 27 PID 884 wrote to memory of 1552 884 rundll32.exe 28 PID 884 wrote to memory of 1552 884 rundll32.exe 28 PID 884 wrote to memory of 1552 884 rundll32.exe 28 PID 884 wrote to memory of 1552 884 rundll32.exe 28 PID 884 wrote to memory of 960 884 rundll32.exe 29 PID 884 wrote to memory of 960 884 rundll32.exe 29 PID 884 wrote to memory of 960 884 rundll32.exe 29 PID 884 wrote to memory of 960 884 rundll32.exe 29 PID 1424 wrote to memory of 1604 1424 explorer.exe 31 PID 1424 wrote to memory of 1604 1424 explorer.exe 31 PID 1424 wrote to memory of 1604 1424 explorer.exe 31 PID 884 wrote to memory of 960 884 rundll32.exe 29 PID 1564 wrote to memory of 1196 1564 iexplore.exe 34 PID 1564 wrote to memory of 1196 1564 iexplore.exe 34 PID 1564 wrote to memory of 1196 1564 iexplore.exe 34 PID 1564 wrote to memory of 1196 1564 iexplore.exe 34 PID 884 wrote to memory of 1820 884 rundll32.exe 35 PID 884 wrote to memory of 1820 884 rundll32.exe 35 PID 884 wrote to memory of 1820 884 rundll32.exe 35 PID 884 wrote to memory of 1820 884 rundll32.exe 35 PID 884 wrote to memory of 1820 884 rundll32.exe 35 PID 884 wrote to memory of 1564 884 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec2f9735aea37282eea523010329322725fcb46bd7ac9acb645afdc2ac7e6631.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec2f9735aea37282eea523010329322725fcb46bd7ac9acb645afdc2ac7e6631.dll,#12⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1552
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:960
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1820
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:1604
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1564 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1196
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603B
MD5a6c916392b8b648951bb24c83bbfed3f
SHA17ed1aa4cd832945ad1ca7e272ced3112c067c564
SHA256cf3a0f284489205d51143a7d750cee19e5abc87d0652864535f2fa2d9d1871e6
SHA51225328bd011004a0866ee54ff920590daa74390dffb630638d5c4cb00a5934c289c30b3edcbf1c6e8643d77880a90865293c8948bfdf1d4a67b7c2308c375b81f